Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Medina

Region: Medina Region

Country: Saudi Arabia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.0.16.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.0.16.142.			IN	A

;; AUTHORITY SECTION:
.			184	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020401 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 05 09:33:42 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 142.16.0.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.16.0.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.89.94.137 attack
1591704062 - 06/09/2020 14:01:02 Host: 183.89.94.137/183.89.94.137 Port: 445 TCP Blocked
2020-06-10 04:19:14
125.138.149.54 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-06-10 04:05:19
113.99.127.190 attackspambots
bruteforce detected
2020-06-10 04:09:08
185.94.111.1 attack
 UDP 185.94.111.1:43318 -> port 11211, len 43
2020-06-10 04:07:29
182.23.68.119 attackbots
Fail2Ban Ban Triggered
2020-06-10 04:01:00
181.123.10.221 attackbotsspam
Invalid user xv from 181.123.10.221 port 58532
2020-06-10 03:58:21
110.12.8.10 attackbots
Jun  9 20:47:32 sigma sshd\[30678\]: Invalid user div21admin from 110.12.8.10Jun  9 20:47:34 sigma sshd\[30678\]: Failed password for invalid user div21admin from 110.12.8.10 port 35877 ssh2
...
2020-06-10 04:20:12
103.121.68.199 attack
20/6/9@10:50:12: FAIL: Alarm-Network address from=103.121.68.199
...
2020-06-10 04:15:07
218.17.185.31 attackspam
Jun  9 15:01:56 * sshd[32204]: Failed password for root from 218.17.185.31 port 39626 ssh2
Jun  9 15:02:50 * sshd[32313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.185.31
2020-06-10 03:58:08
41.207.31.169 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-10 03:48:32
34.67.172.19 attack
Jun  9 11:59:41 mockhub sshd[21245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.67.172.19
Jun  9 11:59:44 mockhub sshd[21245]: Failed password for invalid user max from 34.67.172.19 port 49724 ssh2
...
2020-06-10 04:13:02
191.184.42.175 attackbots
Jun  9 17:45:55 rush sshd[10516]: Failed password for root from 191.184.42.175 port 48006 ssh2
Jun  9 17:52:53 rush sshd[10693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.184.42.175
Jun  9 17:52:56 rush sshd[10693]: Failed password for invalid user monitor from 191.184.42.175 port 49470 ssh2
...
2020-06-10 03:46:30
95.9.163.3 attack
Unauthorized connection attempt from IP address 95.9.163.3 on Port 445(SMB)
2020-06-10 04:00:22
106.13.164.136 attack
Jun  9 15:16:46 abendstille sshd\[18323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.164.136  user=root
Jun  9 15:16:48 abendstille sshd\[18323\]: Failed password for root from 106.13.164.136 port 58372 ssh2
Jun  9 15:24:14 abendstille sshd\[26419\]: Invalid user vivo from 106.13.164.136
Jun  9 15:24:14 abendstille sshd\[26419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.164.136
Jun  9 15:24:17 abendstille sshd\[26419\]: Failed password for invalid user vivo from 106.13.164.136 port 60116 ssh2
...
2020-06-10 03:53:30
119.44.20.30 attackspam
Jun  9 20:10:36 webhost01 sshd[18457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.44.20.30
Jun  9 20:10:38 webhost01 sshd[18457]: Failed password for invalid user yaoyiming from 119.44.20.30 port 17966 ssh2
...
2020-06-10 03:44:25

Recently Reported IPs

250.212.122.209 110.134.127.12 52.75.224.245 237.250.80.150
132.171.63.7 74.46.139.182 78.154.85.229 45.191.99.215
251.117.214.152 26.171.79.144 102.54.9.181 91.41.127.3
47.64.72.187 45.8.202.70 123.167.143.78 208.57.216.126
22.85.119.81 121.180.120.20 163.54.86.209 81.138.40.82